Interested? Be sure to review what it takes to work for me. If these projects look interesting, reach out to me.

Current Projects

Other Research Projects Underway

Current Projects

Obfuscated 5G

We are developing a universal radio adapter that will enable seamless and secure operation through non-cooperative indigenous 5G networks. This is a multi-university project; our part is around data hiding, also known as obfuscation. We will be using stenographic technologies embedded in popular applications to blend in with local traffic. The obsfucator will be integrated in with a physical radio adapter that runs from HF through Ku bands for military users and UHF through EHF for 5G users.

Next G and 5G: Spectrum Sharing

We are developing a generalized context-aware spectrum sharing and interference analysis tool that provides a set of dynamic policies and extends the state of the art of spectrum policy regulation. Today, the current understanding of ”dynamic” spectrum sharing is embodied by the existing CBRS SAS model. That model has a fixed notion of regulatory policy, namely the fixed hierarchy where Federal users get first priority, then paid users, followed by unlicensed users. Moreover, spectrum repurposing in the U.S. tends to be made with decade-long time horizons. The heart of our proposed work is its ability to apply multiple contextual aspects of the environment for frequency assignments. The dynamic physical environment, such as weather, new buildings, summer/winter foliage, etc. can significantly impact propagation in these bands. Moreover, a dynamic tool for spectrum sharing must take into account future technological and policy choices. Without a dynamic tool for spectrum sharing, users cannot take advantage of the continuing improvement in radio technology until the 10+ year regulatory cycle plays out. Specifically, this research will deliver a tool set for analyzing the impact of various regulatory policies on spectrum usage, sharing, and possibility of harmful interference to primary users, especially passive users. This tool set incorporates analysis for efficient spectrum sharing and harmonious coexistence with active and passive users in geographic space, including altitude, as well as in temporal space, considering, for example, satellite orbits, unmanned aerial vehicles (UAVs), or special events.

Economics of Illegal Robocall Mitigation

The FCC has implemented many regulations requiring the deployment of cryptographically secure caller identification signaling in the all-IP network. This enables the carrier to put a notation on the call saying the number was verified. This notation is the “Caller Verified” or green check mark on mobile phones and “[v]” in some networks for landline Caller-ID. However, subscribers still might not answer a verified call from a number they do not recognize. The issue is the subscriber may want to answer the call. It could be a store trying to schedule a delivery, a school calling about a school closure, or a bank calling about a suspicious charge. One proposal to address this is to have the carrier display the caller’s logo, or brand, to the subscriber when the call arrives. The presumption is that if the subscriber does not recognize the caller’s number, they will recognize their logo.

This project will look at the economic impact of branded calling on answer rates, and how the answer rates impact the caller’s business.

Other Projects

Next G wireless networks

Protocols, applications, services, and policy for future wireless networks, 5G and Beyond. Some of this work is in association with the Next G Alliance. You would get to participate in the creation of new standards for reestablishing North American leadership in wireless networking technology, applications, services, and manufacturing.

DeFi Liquidity State of the Art

Examine the status quo of liquidity pools and existing automated market makers across different decentralized exchanges.

DeFi Arbitrage State of the Art

Most liquidity models presume arbitrage as a mechanism to provide fair pricing to realize liquidity. However, experience has shown that tokens with different characteristics have different arbitrage opportunities than tokens with similar characteristics, resulting in different distributed exchanges using vastly different algorithms, usually with the goal of reducing slippage between the tokens in the pool. Examine the arbitrage state of the art by collecting and analyzing structural characteristics of various arbitrage schemes between different implementations.

National Security / Emergency Preparedness Communications

Would you like to know how the communications network really works? Want to get to play with the latest 5G mobile phones, embedded computers, hardware key storage modules, 911 calling, or just learn what this list means? I will need a number of people to work on a project relating to emergency communications, including video and data. Sometimes the call absolutely, positively has to go through!

Return on Investment in a DoD Environment

Interested in how technology businesses market high technology products and services? Interested in how the Department of Defense’s needs are different from commercial enterprises? Interested in how technology gets adopted? The goal of this project is to improve the defense acquisition process to enable better acquisition decisions by adapting the best practices of the private sector and non-DoD public sector’s Return on Investment (ROI) calculations to reflect the unique, non-monetary components the DoD considers as its ‘return.’ For example, more effective stealth, faster delivery of technology to the battle field, and more complete data for analysts do not necessarily have a dollar value, but have immense value to the DoD mission.

Except for pure enterprise IT projects addressing classical enterprise IT functions of the DoD, such as payroll or non-warfighter travel, there does not exist a generic framework for ROI calculations that take into account the unique mission values for DoD acquisition. This project attempts to address this need. Moreover, we hypothesize that a standard framework for evaluating ROI may allow acquisition personnel to accelerate the development, letting, and award of contracts.

Distributed Oracles

What is truth? How do we get information from the real world onto a blockchain? This project looks at the epistemological, computer science, and game theoretic aspects of encouraging distributed actors to tell the truth about real world events. Some events are trivially easy, like a Bitcoin transaction on the bitcoin blockchain. Some events are unknowable, like what number I am thinking of this instant. However, for the events in between, we are characterizing events to create an ontology of knowable and unknowable events and a framework, model, and prototype of bringing knowable events onto a blockchain.


Use of blockchain for identity management. Economics of blockchain versus conventional, distributed computing. Which legal contracts are computable on the blockchain? The policy, legal, and economic impacts of blockchain.

Cyber Threat Intelligence Information Exchange

Whatever is necessary to improve the security posture of the world’s networks, whether attacked by nation states, professional organized crime, lone hackers, or confused users.

Policy and Governance for Secure Communications

How to ensure compliance with applicable regulations, fiduciary responsibility, and legal requirements to interconnect enterprises with security or compliance responsibilities.

I am always open for interesting project proposals that we can market to extramural funders and clearly am open for independent study and thesis work.